Best State of Art IT Security Solutions
The best Innovative and powerful IT Security products

Encyclopedia / Encyclopedia Part 5 /

What is a Password Replay Attack?

A replay attack entails interruption of the data packets and replaying the recorded series afterwards. In simpler terms, these data packets are sent to the endpoint server without any apparent changes.

Replay attack is deemed to have similar characteristics

As that of the man-in-the-middle attacks. In a more detailed view of this procedure, it can be stated that there is an agent that is inserted within the line of communication between the client and the server.
Once a replay attack proceeds, the set of data being transmitted will be recorded. This is for done for the purpose of permitting future alteration of the data and these data will be kept for carrying out future evil activities.
The replay attack may be used in spying on users who had previously logged into a banking website and had initiated transactions that were supposedly confidential. Everything that a user did during the entire process may be recorded and replayed in the future. Hence, it will be possible for the attackers to take advantage of all the collected data in stealing money from a bank account.
There are various methods as to how one can fight off the replay attack and these include the following: timestamps, encryption, packet sequences, and serial numbers. These components are considered to be very effective in helping a system to identify which among the pieces of data are being repeated based on the previous session.
 Vulnerability Scanner - Vulnerability Management 

➤ Related pages
Attacks on Macros and ActiveX?
Crack WiFi Passwords
Hacking WiFi password
Hacking WiFi Passwords
What is a Cracker?
What is a Null Session?
What is a Password Replay Attack?
What is a password?
What is Cyberwarfare?
What is Linux?
What is MD5 Encryption?
What is Novell NetWare?
What is Phrack?
What is Social Engineering?
Wi-Fi Auditor the Portable Penetrator
WiFi Decoder Recover
WiFi Password Cracker soft
WPA hacking software

Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software

SecPoint is specialized to deliver the best IT security solutions and products.

Compatible with Product
Securely protected by SecPoint
Customer reference King Customer reference New York Customer reference ROC Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef Customer reference King Customer reference New York Customer reference Roc Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef